Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mikeroyal-patch-10 #42

Open
wants to merge 34 commits into
base: mikeroyal-patch-9
Choose a base branch
from
Open
Changes from 1 commit
Commits
Show all changes
34 commits
Select commit Hold shift + click to select a range
1b14fb4
Added Detection & Response Types category.
mikeroyal Mar 21, 2023
0f3e20a
Merge pull request #32 from mikeroyal/mikeroyal-patch-9
mikeroyal Mar 24, 2023
740ed7f
Merge pull request #33 from mikeroyal/mikeroyal-patch-10
mikeroyal Mar 26, 2023
c8f85eb
Updated table of contents.
mikeroyal Mar 26, 2023
fb5102a
Added more security tools for OSINT and forensics.
mikeroyal Apr 3, 2023
bc95933
Added Contributing Guidelines.md
mikeroyal Apr 5, 2023
1a0618e
Merge pull request #35 from mikeroyal/mikeroyal-patch-11
mikeroyal Apr 9, 2023
096acbb
Merge pull request #34 from mikeroyal/mikeroyal-patch-10
mikeroyal Apr 9, 2023
cac993a
Added Tools for User Management & Authentication.
mikeroyal Apr 15, 2023
2cfbd02
Added more security tools.
mikeroyal Apr 20, 2023
f3e64f6
Added more Security Standards.
mikeroyal Apr 20, 2023
5f57e07
Merge pull request #36 from mikeroyal/mikeroyal-patch-10
mikeroyal Apr 22, 2023
a737e6d
Merge pull request #37 from mikeroyal/mikeroyal-patch-11
mikeroyal Apr 23, 2023
4975e48
Merge pull request #38 from mikeroyal/mikeroyal-patch-12
mikeroyal Apr 23, 2023
2c5dabb
Added Security Glossary.
mikeroyal May 1, 2023
3ac0335
Merge pull request #39 from mikeroyal/mikeroyal-patch-10
mikeroyal May 5, 2023
3675a1c
Added Security Books section for Getting Started
mikeroyal May 10, 2023
5cd8477
Merge pull request #40 from mikeroyal/mikeroyal-patch-10
mikeroyal May 13, 2023
f5644c1
Added more books.
mikeroyal May 13, 2023
2653e79
Added Playbooks section.
mikeroyal May 17, 2023
d5a3917
Merge pull request #41 from mikeroyal/mikeroyal-patch-10
mikeroyal May 22, 2023
ad965df
Updated books.
mikeroyal May 22, 2023
f1b1c18
Updated README.md
mikeroyal Jun 17, 2023
c944ee4
Added more Security Tools.
mikeroyal Jul 10, 2023
479a1c5
Updated Security Tools section.
mikeroyal Jul 10, 2023
68cc13f
Updated Security Standards, Frameworks and Benchmarks.
mikeroyal Aug 17, 2023
3bd281c
Updated Incident Management.
mikeroyal Aug 19, 2023
c315e84
Added Wazuh to SIEM Tools.
mikeroyal Sep 3, 2023
876fc86
Merge pull request #44 from mikeroyal/mikeroyal-patch-10
mikeroyal Sep 9, 2023
b075677
Added YouTube Tutorials section.
mikeroyal Sep 9, 2023
6cdbad9
Merge pull request #45 from mikeroyal/mikeroyal-patch-10
mikeroyal Sep 14, 2023
3fd6710
Updated YouTube Videos section.
mikeroyal Oct 11, 2023
beb94e1
Merge pull request #46 from mikeroyal/mikeroyal-patch-10
mikeroyal Oct 20, 2023
a8d88a3
Updated Maintenance.
mikeroyal Jan 4, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Updated Security Standards, Frameworks and Benchmarks.
mikeroyal authored Aug 17, 2023
commit 68cc13f28a03c3912637435199f0321928658ae2
76 changes: 76 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -33,6 +33,9 @@
* [Security Information and Event Management (SIEM)](#Security-information-and-event-management-SIEM)
* [User and Entity Behavior Analytics (UEBA)](#User-and-Entity-Behavior-Analytics-UEBA)
* [Detection & Response Types](#detection--response-types)
* [Evidence Collection](#evidence-collection)
* [Incident Management](#incident-management)
* [Sandboxing/Reversing Tools](#sandboxingreversing-tools)

3. [Security Tools](https://github.com/mikeroyal/Open-Source-Security-Guide#security-tools)

@@ -471,6 +474,79 @@ There is a close relation between UEBA and SIEM technologies, because UEBA relie
<img src="https://user-images.githubusercontent.com/45159366/226541125-f6b079d5-022d-413e-ad35-bb2b80e24428.png">
</p>

### Evidence Collection

[Back to Top](#table-of-contents)

**Evidence Collection** - is a set of protocols that apply to both pre-collection and post-collection evidence. This process helps with Preserving & Collecting Evidence making sure the evidence is not destroyed or devalued as a source of information.

<p align="center">
<img src="https://github.com/mikeroyal/Open-Source-Security-Guide/assets/45159366/6d429dcc-be27-429e-8e07-3997e0038210">
</p>

* [Acquire](https://github.com/fox-it/acquire) - Acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container. This makes Acquire an excellent tool to, among others, speedup the process of digital forensic triage. It uses [Dissect](https://github.com/fox-it/dissect) to gather that information from the raw disk, if possible.
* [artifactcollector](https://github.com/forensicanalysis/artifactcollector) - The artifactcollector project provides a software that collects forensic artifacts on systems.
* [bulk_extractor](https://github.com/simsong/bulk_extractor) - Computer forensics tool that scans a disk image, a file, or a directory of files and extracts useful information without parsing the file system or file system structures. Because of ignoring the file system structure, the program distinguishes itself in terms of speed and thoroughness.
* [Cold Disk Quick Response](https://github.com/rough007/CDQR) - Streamlined list of parsers to quickly analyze a forensic image file (`dd`, E01, `.vmdk`, etc) and output nine reports.
* [CyLR](https://github.com/orlikoski/CyLR) - The CyLR tool collects forensic artifacts from hosts with NTFS file systems quickly, securely and minimizes impact to the host.
* [Forensic Artifacts](https://github.com/ForensicArtifacts/artifacts) - Digital Forensics Artifact Repository
* [ir-rescue](https://github.com/diogo-fernan/ir-rescue) - Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
* [Live Response Collection](https://www.brimorlabs.com/tools/) - Automated tool that collects volatile data from Windows, OSX, and \*nix based operating systems.
* [Margarita Shotgun](https://github.com/ThreatResponse/margaritashotgun) - Command line utility (that works with or without Amazon EC2 instances) to parallelize remote memory acquisition.
* [UAC](https://github.com/tclahr/uac) - UAC (Unix-like Artifacts Collector) is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.

### Incident Management

[Back to Top](#table-of-contents)

**Incident Management** - is the process used by development and IT Operations teams to respond to an unplanned event or service interruption and restore the service to its operational state.

<p align="center">
<img src="https://github.com/mikeroyal/Open-Source-Security-Guide/assets/45159366/5998534a-781f-48b9-9f06-d24f07231129">
</p>

* [Catalyst](https://github.com/SecurityBrewery/catalyst) - A free SOAR system that helps to automate alert handling and incident response processes.
* [CyberCPR](https://www.cybercpr.com) - Community and commercial incident management tool with Need-to-Know built in to support GDPR compliance while handling sensitive incidents.
* [Cyphon](https://medevel.com/cyphon/) - Cyphon eliminates the headaches of incident management by streamlining a multitude of related tasks through a single platform. It receives, processes and triages events to provide an all-encompassing solution for your analytic workflow — aggregating data, bundling and prioritizing alerts, and empowering analysts to investigate and document incidents.
* [CORTEX XSOAR](https://www.paloaltonetworks.com/cortex/xsoar) - Paloalto security orchestration, automation and response platform with full Incident lifecycle management and many integrations to enhance automations.
* [DFTimewolf](https://github.com/log2timeline/dftimewolf) - A framework for orchestrating forensic collection, processing and data export.
* [DFIRTrack](https://github.com/dfirtrack/dfirtrack) - Incident Response tracking application handling one or more incidents via cases and tasks with a lot of affected systems and artifacts.
* [Fast Incident Response (FIR)](https://github.com/certsocietegenerale/FIR/) - Cybersecurity incident management platform designed with agility and speed in mind. It allows for easy creation, tracking, and reporting of cybersecurity incidents and is useful for CSIRTs, CERTs and SOCs alike.
* [RTIR](https://www.bestpractical.com/rtir/) - Request Tracker for Incident Response (RTIR) is the premier open source incident handling system targeted for computer security teams. We worked with over a dozen CERT and CSIRT teams around the world to help you handle the ever-increasing volume of incident reports. RTIR builds on all the features of Request Tracker.
* [Sandia Cyber Omni Tracker (SCOT)](https://github.com/sandialabs/scot) - Incident Response collaboration and knowledge capture tool focused on flexibility and ease of use. Our goal is to add value to the incident response process without burdening the user.
* [Shuffle](https://github.com/frikky/Shuffle) - A general purpose security automation platform focused on accessibility.
* [threat_note](https://github.com/defpoint/threat_note) - Lightweight investigation notebook that allows security researchers the ability to register and retrieve indicators related to their research.
* [Zenduty](https://www.zenduty.com) - Zenduty is a novel incident management platform providing end-to-end incident alerting, on-call management and response orchestration, giving teams greater control and automation over the incident management lifecycle.


### Sandboxing/Reversing Tools

[Back to Top](#table-of-contents)

**Sandboxing** - is a security practice in which you use an isolated environment, or a "sandbox," for testing. Within the sandbox you run code, analyze the code in a safe, isolated environment without affecting the application, system or platform.

**Reverse-engineering** - is the process of dismantling a device, system, or piece of software to see how it works. It's done primarily to analyze and gain knowledge about the way a product works but often is used to duplicate or enhance the product.

<p align="center">
<img src="https://github.com/mikeroyal/Open-Source-Security-Guide/assets/45159366/a1e6bdcd-39d7-428f-b74f-9334707f2893">
</p>

* [Any Run](https://app.any.run/) - Interactive online malware analysis service for dynamic and static research of most types of threats using any environment.
* [CAPEv2](https://github.com/kevoreilly/CAPEv2) - Malware Configuration And Payload Extraction.
* [Cutter](https://github.com/radareorg/cutter) - Reverse engineering platform powered by Radare2.
* [Ghidra](https://github.com/NationalSecurityAgency/ghidra) - Software Reverse Engineering Framework.
* [Hybrid-Analysis](https://www.hybrid-analysis.com/) - Free powerful online sandbox by CrowdStrike.
* [Intezer](https://analyze.intezer.com/#/) - Intezer Analyze dives into Windows binaries to detect micro-code similarities to known threats, in order to provide accurate yet easy-to-understand results.
* [Joe Sandbox (Community)](https://www.joesandbox.com/) - Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, MacOS, Linux, and iOS for suspicious activities; providing comprehensive and detailed analysis reports.
* [Mastiff](https://github.com/KoreLogicSecurity/mastiff) - Static analysis framework that automates the process of extracting key characteristics from a number of different file formats.
* [Metadefender Cloud](https://www.metadefender.com) - Free threat intelligence platform providing multiscanning, data sanitization and vulnerability assessment of files.
* [Radare2](https://github.com/radareorg/radare2) - Reverse engineering framework and command-line toolset.
* [Reverse.IT](https://www.reverse.it/) - Alternative domain for the Hybrid-Analysis tool provided by CrowdStrike.
* [StringSifter](https://github.com/fireeye/stringsifter) - A machine learning tool that ranks strings based on their relevance for malware analysis.
* [Threat.Zone](https://app.threat.zone) - Cloud based threat analysis platform which include sandbox, CDR and interactive analysis for researchers.
* [Valkyrie Comodo](https://valkyrie.comodo.com) - Valkyrie uses run-time behavior and hundreds of features from a file to perform analysis.
* [Viper](https://github.com/viper-framework/viper) - Python based binary analysis and management framework, that works well with Cuckoo and YARA.
* [Virustotal](https://www.virustotal.com) - Free online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by antivirus engines and website scanners.

# Security Tools
[Back to the Top](https://github.com/mikeroyal/Open-Source-Security-Guide#table-of-contents)